How to find the most effective C-UAS?
Diverse needs from various users
Even though the systems are called by the single word "C-UAS", its role and effectiveness widely varies based on user's diverse needs. What needs should we look at to build a reliable system?
We have found that the equipment utilized for C-UAS has its own unique features. So what does an "optimal system" look like?
Depending on the environment and specific area the user wants to deploy the system, the requirements will differ. We need more info on their actual needs.
Yes! Then, let's interview some users and gather
specific needs!
Note: The users below are model cases integrating general market requirements, not real customers.
Model cases of users
The optimal system varies depending on users, operations and locations!
C-UAS is expected to be popularized and utilized by a variety of users, but the optimal system configuration differs depending on the user's characteristics. By selecting the optimal equipment and method for each user, a highly reliable system can be made.
It is very clear that needs from users highly varies depending on the industry, application and environment when we laid out their requirements in this way.
That's true. To build the best system, we also must see user needs that we need to be aware of. It is important to optimize the system according to each user.
Installation plans
For developing an effective C-UAS system, it is necessary to create an optimal installation plan that matches the requirements of that certain area or type of threats. When creating installation plans, what kind of points do we need to be aware of?
From the interviews, we found that the characteristics and functions are highly dependent to the user's operating environment. I'll look deeper into essential points to make a proposable installation plan.
Indeed. There are diverse requirements to C-UAS and it cannot be explained in the single word "C-UAS"!
Let's see what kind of points we need to take care of based on the user interview.
An example of checkpoints to make installation plans
If countermeasure against malicious drones is necessary, further steps are required.
If countermeasure for mitigation is necessary, it is required to consider about minimizing collateral damages and areas for the mitigation. For safe installation and operation of C-UAS, preparation such as well-structured installation plans based on actual environment and readiness to meet legal requirements is necessary.
For safe and effective operation of C-UAS system, there are many points which we need to take care of other than selection of equipment.
You're right. We can build a more reliable system by investigating the surrounding environments, legal requirements and so on.
System configuration depending on scenes
Various facilities require counter drones, but it is necessary to configure a system using the most suitable equipment. What kind of system will be created when the equipment is selected according to the requirements of each facility?
From the results of user interviews and legal research, we have been able to see the optimal system configuration for each facility! We will reflect this in proposals to clients.
That's a good idea. Please create a system configuration plan that takes into account not only the customer's requirements, but also laws, regulations, and location conditions.
System configuration examples for various scenes
*There is no relation between security configurations and places to those that really exist.
In order to reliably detect, track and classify drones approaching to the facilities, multiple sensors are required to be appropriately positioned and deployed.
Countermeasures such as jammers and nets are also be positioned in case or emergency.
Radars that are capable with long range detection are deployed so as not to affect aircraft operations, and RF sensors are used in the nearby area so as not to interfere with radar within the airport.
Power plants must be prepared not only for intrusions of civilian drones, but also for the risk of terrorist attacks, and must be able to detect drones from a distance.
Countermeasures such as jammers and nets are also be positioned in case or emergency.
Since the security needs to be done temporarily, it is best to use equipment which is small, light-weight and easy to deploy.
Important points to keep in mind vary from facility to facility
Defense facilities require an environment that allows for instant situational awareness and appropriate decision-making. At airports, it is important to cooperate with each department and create a system for quickly sharing information on the detection of suspicious targets. Power plants also require strict surveillance in preparation for terrorist attacks. Event security requires the use of equipment that is easy to deploy, withdraw, and capable to construct a surveillance system very quickly.
We have created model plans based on the characteristics of each user. Using this as a basis, we can create plans that are perfect for each customer!
That's great! Let's continue to listen to customer’s voices and consider the optimal system configuration!
C-UAS Solution
Toshiba offers a comprehensive system that detects, tracks, identifies, and mitigates threats from suspicious drones.